Chapters & Articles

All Articles

Showing 1-20 of 789

Sort by Date | Title

Page: 1 2 3 4 5 Next >

1.
Sharing the Context
By Chad Mitchell, Jamie Sanbower, Vivek Santuka, Aaron Woland
Jul 9, 2019

In this sample chapter from Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization, you will learn about the many different ways of sharing context out of Cisco Identify Services Engine (ISE) to other security solutions, about Rapid Threat Containment, and about the Platform Exchange Grid (pxGrid). Because ISE is positioned to know exactly who and what is on the network at any given time, as well as assign different levels of access and context assignments with security group tags, it is the perfect security tool to be at the center of a security ecosystem.

2.
CSR 1000V Software Architecture
By Arvind Durai, Stephen Lynn, Amit Srivastava
Jan 16, 2019

In this sample chapter from Virtual Routing in the Cloud, explore the software and data plane design of the CSR 1000V, a virtualized software router that runs the IOS XE operating system.

3.
IoT and Security Standards and Best Practices
By Rik Irons-Mclean, Anthony Sabella, Marcelo Yannuzzi
Jan 14, 2019

In this sample chapter from Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT, the author team raises awareness of what should be considered when planning to secure an IoT system and highlights some of the more robust standards and best practices used today that can help.

4.
Infrastructure Security and Segmentation
By Mason Harris, Jamie Sanbower, Vivek Santuka, Aaron Woland
Jan 11, 2019

In this sample chapter from Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention, AMP, and Content Security, you will review security of the three planes of network infrastructure, the importance of segmenting traffic and methods for doing so, and the benefits of NetFlow.

5.
Linux Operating System
By Cisco Networking Academy
Jan 10, 2019

In this sample chapter from CCNA Cybersecurity Operations Companion Guide and the Cisco Networking Academy, learn how to perform basic Linux operations as well as administrative and security-related tasks.

6.
Multicast Design Solutions
By Ray Blair, Arvind Durai, Josh Loveless
Jan 10, 2019

In this sample chapter from IP Multicast, Volume II: Advanced Multicast Concepts and Large-Scale Multicast Design, you will examine several archetypical network design models and best practices for multicast deployments.

7.
Cybersecurity and the Security Operations Center
By Cisco Networking Academy
Jan 9, 2019

In this sample chapter from CCNA Cybersecurity Operations Companion Guide and the Cisco Networking Academy, you will learn about the who, what, and why of cyberattacks—plus review available resources to prepare for a career in cybersecurity operations.

8.
External Routing with ACI
By Frank Dagenhardt, Bill Dufresne, Jose Moreno
Jan 9, 2019

In this sample chapter from Deploying ACI: The complete guide to planning, configuring, and managing Application Centric Infrastructure, learn how to enable Layer 3 communication and integrate with routing protocols you may already be using in your environment.

9.
NX-OS Troubleshooting Tools
By Brad Edgeworth, Richard Furr, Vinit Jain
Jan 8, 2019

In this sample chapter from Troubleshooting Cisco Nexus Switches and NX-OS, you will review the various tools available on the Nexus platform that can help in troubleshooting and day-to-day operation.

10.
Responding to a Breach
By Aamir Lakhani, Joseph Muniz
Jan 8, 2019

In this sample chapter from Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, you will explore the basic concepts for proper incident response procedure to understand why organizations commonly fail at the process when responding to a breach. The authors also share techniques used by organizations that have a successful incident response plan and provide an overview of industry-proven components required to build an incident response process within your organization.

11.
FTD on ASA 5500-X Series Hardware
By Nazmul Rajib
Jul 3, 2018

In this sample chapter from Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall, Next-Generation Intrusion Prevention System, and Advanced Malware Protection, review the steps required to reimage and troubleshoot any Cisco ASA 5500-X Series hardware.

12.
Service Design and Building the IT Service Portfolio
By Justin Mann
Apr 6, 2018

In this sample chapter from IT as a Service (ITaaS) Framework, The: Transform to an End-to-End Services Organization and Operate IT like a Competitive Business, examine the purpose, goals, and value potential of a Service portfolio. You’ll also explore how to design specific elements of the Service portfolio and review various guidelines, best practices, and lessons learned for the successful design of IT Services across the enterprise.

13.
Explore the Network
Jan 10, 2018

This sample chapter from Introduction to Networks v6 Companion Guide , introduces the platform of data networks upon which our social and business relationships increasingly depend. The material lays the groundwork for exploring the services, technologies, and issues encountered by network professionals as they design, build, and maintain the modern network.

14.
Introduction to Performance Routing (PfR)
By Brad Edgeworth, Jean Marc Barozet, Nir Ben-Dvora, Anthony Lockhart, David Prall
Jan 10, 2018

In this sample chapter from Cisco Intelligent WAN (IWAN), the authors cover Performance Routing (PfR), Introduction to the IWAN domain, and Intelligent path control principles

15.
BGP Fundamentals
By Vinit Jain, Brad Edgeworth
Jan 1, 2018

In This sample chapter from Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP, the authors cover BGP Messages and Inter-Router Communication, Basic BGP Configuration for IOS, IOS XR, and NX-OS, IBGP Rules, EBGP Rules, and BGP Route Aggregation

16.
Introduction to Lab Procedures and Tool Use
By - Cisco Networking Academy
Jan 1, 2018

This sample chapter from IT Essentials Companion Guide v6, 6th Edition, covers basic safety practices for the workplace, hardware and software tools, and the disposal of hazardous materials. Safety guidelines help protect individuals from accidents and injury. They also help to protect equipment from damage. Some of these guidelines are designed to protect the environment from contamination caused by improperly discarded materials.

17.
Introduction to Nexus Data Center Infrastructure and Architecture
By Chad Hintz, Ozden Karakok, Cesar Obediente
Jan 1, 2018

In this sample chapter from CCNA Data Center DCICN 200-150 Official Cert Guide, focuses on the Cisco Nexus product family. You learn the different specifications of each product, which includes Nexus 9000, Nexus 7000, Nexus 6000, Nexus 5000, Nexus 3000, and Nexus 2000.

18.
QoS Design Principles and Best Practices
By Marwan Al-shawi, Andre Laurent
Jan 1, 2018

In this sample chapter from Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320, 4th Edition, the authors cover some best practice QoS design principles and QoS strategy models that are used to implement the numerous QoS tools we have at our disposal. Remember that usually, more than one solution fits the given QoS requirements, so simplifying the models leveraged can significantly accelerate and ensure proper QoS deployment.

19.
Routing Concepts
Jan 1, 2018

This sample chapter from Routing and Switching Essentials v6 Companion Guide, answer the question, “What does a router do with a packet received from one network and destined for another network?” Details of the routing table will be examined, including connected, static, and dynamic routes.

20.
LAN Design
By Cisco Networking Academy
Dec 1, 2017

In this sample chapter from Scaling Networks v6 Companion Guide, learn strategies that can be used to systematically design a highly functional network, such as the hierarchical network design model and appropriate device selections.

Page: 1 2 3 4 5 Next >